Research and Analysis of Intrusion Prevention Based on Trusted in Cloud Environment

Article Preview

Abstract:

Cloud computing has a nature of dynamic, virtualization and opening since it made. All kinds of large-scale cloud security incidents makes frequent cloud environment safety has been questioned. In order to ensure the security of cloud environments, intrusion prevention technologies trusted computing ideas proposed by combining intrusion prevention framework model based on trusted computing environment under a cloud. The model departure from the principle of intrusion prevention, access to behavioral characteristics, and then gradually normalize these features determine the weight of each feature heavy user node's credibility after the draw. Then it use a variety of cloud cluster server engine to detect defense and integrated decision analysis and cluster analysis to make timely cloud fast, and change the traditional intrusion prevention for their own business, to detect the status of the defense lag for cloud users with the maximum safe limit intrusion prevention services, but also to ensure that the cloud can withstand attacks, so the cloud and cloud users bidirectional safety effects.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1887-1890

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Azmandian F, Moffie M, Alshawabkeh M, DyJ, Aslam J, Kaeli D. Virtual machine monitor-based lightweight intrusion detection. SIGOPS-Operating Systems Review 2011; 45: 38–53.

DOI: 10.1145/2007183.2007189

Google Scholar

[2] Dhage S, B Meshram, R Rawat, S Padawe, M Paingaokar, and A Misra , 'Intrusion detection system in cloud computing environment, ', in International Confer- ence &Work shop on EmergingTrendsin Technology, NewYork, NY, USA p.235–9, (2011).

DOI: 10.1145/1980022.1980076

Google Scholar

[3] Arshad J, Townend P, Xu J. A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems (2012).

DOI: 10.1016/j.future.2011.08.009

Google Scholar

[4] Jin H, Xiang G, Zou D, Wu S, Zhao F, Li M, Zheng W. A VMM-based intrusion prevention system in cloud computing environment. The Journal of Super- computing 2011: 1–19.

DOI: 10.1007/s11227-011-0608-2

Google Scholar

[5] Li Y, Jing C, Xu J. In: Li K, Fei M, Jia L, Irwin G, editors. A New Distributed Intrusion Detection Method Based on Immune Mobile Agent Life System Modeling and Intelligent Computing, 6328. Berlin/Heidelberg: Springer; 2010. p.233–43.

DOI: 10.1007/978-3-642-15621-2_27

Google Scholar